• Sr. SOC Analyst Jobs in United States Of America - 25122248

  • ORACLE
  • United States Of America, Usa
  • Save Job
  • 10 - 13 Years
  • Posted : 18 days ago

Job Description:

Sr SOC Analyst - 190019HL

Preferred Qualifications

We are seeking a Sr SOC Analyst to join the Oracle NetSuite Security team responsible for securing systems, infrastructure, services and data The Security Operations Center Analyst will use data collected from a variety of information security tools and sources (including intrusion detection system alerts, firewall and network traffic logs, and host system logs) to analyze events that occur within the enterprise and perform threat analysis as well as investigate and analyze all response activities related to potential security incidents within the enterprise

The candidate must be able to routinely evaluate priorities based on the dynamic nature of the environment The role requires close collaboration with peers across multiple geographic regions to discuss issues and cases and for performing troubleshooting activities Partnership with multiple internal security teams is paramount for success and overall improvement of security operations Mentoring junior staff is highly encouraged to develop professional relationships

Responsibilities Include

Provide Tier 2 analytical support, respond to security incidents, draft comprehensive incident reports, document and execute lessons learned
Identify security events requiring immediate escalation and response
Document and communicate analysis of research and findings to peers and leadership
Monitor and analyze security events, network traffic, and security alerts across the enterprise
Perform advanced analysis of security events and alerts
Correlate events from multiple sources during investigations Assist with ongoing development and improvement of processes and response procedures to improve overall SOC functions
Conduct investigations of potential intrusion attempts to determine remediation actions and escalation paths
Facilitate meetings to collaborate with internal teams to identify, resolve, and mitigate issues

Perform incident response and handling following documented procedures Track investigation activities during an incident, including identifying next steps, spanning across multiple shifts

Monitor external data sources to maintain awareness of threat condition and determine which security issues may have an impact on the enterprise
Lead a team of junior analysts

Required Skills and Experience

Knowledge of security controls including network security technologies (IDS, IPS, firewall, and WAF), OS hardening, file integrity monitoring, authentication,
Strong understanding of system and network security threats and vulnerabilities
Hands-on experience with TCP/IP and data packet capture analysis, networking fundamentals, common network services, network vulnerabilities and network attack patterns
Experience in security event monitoring and triage, incident response, and/or system/network auditing Hands-on experience using SIEM for data analysis and EDR tools for response purposes
Familiarity with network and endpoint security applications and tools including network scanning tools, NIDS/HIDS, firewalls and web proxies
Self-motivated, excellent analytical and problem solving and critical thinking skills

Exercise sound judgement calls for investigative purpose, including making the determination to close a case
2 years leading a team of analysts 5 years as a SOC Analyst
10 years in Information Technology preferably as a security engineer, system administrator, or network engineer

Bachelors degree in Computer Science, Computer Engineering, MIS, or related field
Effective time management skills by completing assignments or delivering updates within required deadlines

Preferred Skills and Experience

Experience with Linux system administration, scripting, log parsing, vulnerability assessments/penetration testing, or vulnerability management
Scripting, programming knowledge and experience Familiarity with industry recognized frameworks including but not limited to MITRE ATT&CK, ADS, NIST 800, and CIS
Recognized industry certification and/or continuing education programs are a major plus including GCIH, GCIA, CISSP, GCFA, GMON, GREM, GNFA

Advanced understanding of Unix & Windows functionality, access control, event logs and monitoring; application and network security
Working knowledge of forensics, incident response and threat hunting methodologies for a cloud service provider

*Please note the above job description pertains to the current vacancy

Responsibilities Include

Provide Tier 2 analytical support, respond to security incidents, draft comprehensive incident reports, document and execute lessons learned
Identify security events requiring immediate escalation and response
Document and communicate analysis of research and findings to peers and leadership
Monitor and analyze security events, network traffic, and security alerts across the enterprise
Perform advanced analysis of security events and alerts
Correlate events from multiple sources during investigations Assist with ongoing development and improvement of processes and response procedures to improve overall SOC functions
Conduct investigations of potential intrusion attempts to determine remediation actions and escalation paths
Facilitate meetings to collaborate with internal teams to identify, resolve, and mitigate issues

Perform incident response and handling following documented procedures Track investigation activities during an incident, including identifying next steps, spanning across multiple shifts

Monitor external data sources to maintain awareness of threat condition and determine which security issues may have an impact on the enterprise
Lead a team of junior analysts

Required Skills and Experience

Knowledge of security controls including network security technologies (IDS, IPS, firewall, and WAF), OS hardening, file integrity monitoring, authentication,
Strong understanding of system and network security threats and vulnerabilities
Hands-on experience with TCP/IP and data packet capture analysis, networking fundamentals, common network services, network vulnerabilities and network attack patterns
Experience in security event monitoring and triage, incident response, and/or system/network auditing Hands-on experience using SIEM for data analysis and EDR tools for response purposes
Familiarity with network and endpoint security applications and tools including network scanning tools, NIDS/HIDS, firewalls and web proxies
Self-motivated, excellent analytical and problem solving and critical thinking skills

Profile Summary:

Employment Type : Full Time
Eligibility : Any Graduate
Industry : Software Services, IT-Software
Functional Area : IT Software : Software Products & Services
Role : System Security
Salary : As per Industry Standards
Deadline : 17th May 2020

Key Skills:

These free online tutorials may interest you

People who search this job also searched for the following Keywords

Sourced**

Salary trends based on over 1 crore profiles

View Salaries

All rights reserved © 2018 Wisdom IT Services India Pvt. Ltd DMCA.com Protection Status